ALAS-2017-816 ---- ntpID: oval:org.secpod.oval:def:1600689 | Date: (C)2017-04-21 (M)2024-01-29 |
Class: PATCH | Family: unix |
Denial of Service via Malformed Config:A vulnerability was discovered in the NTP servers parsing of configuration directives. A remote, authenticated attacker could cause ntpd to crash by sending a crafted message.Potential Overflows in ctl_put functions:A vulnerability was found in NTP, in the building of response packets with custom fields. If custom fields were configured in ntp.conf with particularly long names, inclusion of these fields in the response packet could cause a buffer overflow, leading to a crash. Improper use of snprintf in mx4200_send:A vulnerability was found in NTP, in the legacy MX4200 refclock implementation. If this refclock was compiled in and used, an attacker may be able to induce stack overflow, leading to a crash or potential code execution.Authenticated DoS via Malicious Config Option:A vulnerability was discovered in the NTP servers parsing of configuration directives. A remote, authenticated attacker could cause ntpd to crash by sending a crafted message.Buffer Overflow in DPTS Clock:A vulnerability was found in NTP, in the parsing of packets from the /dev/datum device. A malicious device could send crafted messages, causing ntpd to crash.
Platform: |
Amazon Linux AMI |